0% found this document useful (0 votes)
41 views4 pages

COMPUTER LITERACY PROGRAM PROPOSAL Group 2

The document proposes a computer literacy program on cybersecurity and data privacy. The 2-hour seminar will cover topics like cyber threats, causes of threats, and tips for protecting digital information. It aims to educate 50+ college students on navigating online challenges and increasing cybersecurity awareness.

Uploaded by

Johnrex Bautista
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views4 pages

COMPUTER LITERACY PROGRAM PROPOSAL Group 2

The document proposes a computer literacy program on cybersecurity and data privacy. The 2-hour seminar will cover topics like cyber threats, causes of threats, and tips for protecting digital information. It aims to educate 50+ college students on navigating online challenges and increasing cybersecurity awareness.

Uploaded by

Johnrex Bautista
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

COMPUTER LITERACY PROGRAM PROPOSAL

I. BASIC INFORMATION

Title of the Project: Navigating the Digital Challenges: A Comprehensive Exploration


of Cybersecurity and Data Privacy

Proponents: Winona Gaile Deona


James Ducusin
Marc Ferdinand Insular
Jean Claude Manalo
Edily Manzo
Chriz Ivan Madrigal
Angelica Mendoza
Alexandria Miranda
Johnrex Nunez
Irish Ramos
Ralph Randell Reyonda
Joseph Salavaria
Nicole Sauquillo

Project Leader: Jean Claude Manalo

Project Coordinators: Winona Gaile Deona


Chriz Ivan Madrigal
Alexandria Miranda
Johnrex Nunez
Irish Ramos
Joseph Salavaria
Nicole Sauquillo

Persons Involved: Proponents


IT Seminar Adviser: Ms. Sarah Jane M. Festijo
Dean of CCS: Mr. John Edgar Anthony
Program Chairperson of CCS: Dr. Epie Custodio
1st and 2nd year College Students of Mindoro State University

Implementation:

The seminar will last for two (2) hours on the designated day. Within the
allocated time, it will be divided into four (4) segments. The following outlines the
sequence of the seminar.
Project Timeline:

DATE TOPIC
1st 30 minutes Introduction
A. Navigating the Technology World: An Introduction to
Cybersecurity and Data Privacy
2nd 30 minutes Threats and Their Current Issues
A. Unmasking the Cyber Threats Today's Capabilities and
Challenges
3rd 30 minutes Factors and Causes Behind the Curtain
A. Factors and Cause of Cyber Threats
4th 30 minutes How to Protect Yourself?
A. Tips and Do's and Don'ts Shielding Your Digital Self: Expert
Tips and Ethical Guidelines

Target Participants: The intended audience comprises students who are in their first and
second years at Mindoro State University, with a specific focus on those enrolled in the
Information Technology program.

Target Number of Participants: Minimum of 50 students

II. TECHNICAL DESCRIPTION

Rationale:

In our fast-moving digital world, arranging a seminar with a focus on cybersecurity and
the significance of safeguarding personal data is of paramount importance. Given our growing
reliance on digital technology, there is a pressing need to continuously educate ourselves on
how to stay secure in the online realm. This seminar covers a wide spectrum of subjects,
spanning from the fundamental principles of shielding your digital possessions to navigating the
complex domain of legal regulations governing data privacy. Considering the escalating cyber
threats, it becomes indispensable to fathom the motivations driving malicious activities and the
methods deployed. The seminar also places a spotlight on common pitfalls individuals
encounter and offers tactics for enhancing digital literacy and security awareness.
The safeguarding of one's personal and sensitive data holds critical importance in our
interconnected world, given the potential far-reaching consequences of data breaches.
Consequently, the seminar imparts valuable insights into the best practices for fortifying your
digital defenses and equips you with knowledge on how to react in the unfortunate event of a
data breach. For professionals working in the ever-evolving fields of IT and cybersecurity, the
need for continuous learning and keeping pace with developments is undeniable. The seminar
serves as a conduit for ongoing education, ensuring that you remain updated on the latest
trends, threats, and defense strategies. Concisely, this seminar represents a proactive response
to the growing demand for sustained education and heightened awareness in the ever-evolving
landscape of cybersecurity and data privacy. Its aim is to empower individuals, not just for
professional advancement, but also to contribute to a safer digital world in this era of expanding
digital interconnectedness.
Specific Objectives:

1. To increase participants' awareness of the current cybersecurity threats and data privacy
concerns that impact individuals and organizations.
2. To enhance attendees' knowledge by providing them with a comprehensive
understanding of the essential concepts, terminologies, and strategies related to
cybersecurity and data privacy.
3. To empower participants with practical skills and knowledge, enabling them to effectively
prevent and mitigate a variety of cyber threats, including phishing, malware, and social
engineering.
4. To promote the importance of compliance with relevant regulations and industry
standards in order to ensure data privacy and cybersecurity conformity.
5. To foster engagement among participants through interactive sessions, discussions, and
icebreaker games, creating an immersive and enjoyable learning experience while
reinforcing the seminar's key takeaways.

Strategies/Expected Output:

Strategies:
1. Organize seminar with specific themes related to cybersecurity and data privacy,
providing participants with practical and in-depth insights into key topics.
2. Ensure that that content delivery is thorough and engaging. Develop informative
presentations, demonstrations, and hands-on activities to effectively convey
cybersecurity and data privacy concepts.
3. Use real-life case scenarios and examples of cybersecurity incidents and data breaches
to illustrate the importance of the seminar's topics.
4. Incorporate icebreaker games at various points throughout the seminar to engage the
audience and create a dynamic learning environment. These interactive activities will not
only make the sessions more enjoyable but also provide opportunities for participants to
win prizes, enhancing their overall seminar experience.
5. Organize question-and-answer sessions and panel discussions where participants can
interact with the speaker and ask specific questions. This fosters engagement and
allows for in-depth discussions on relevant topics.
6. Offer certificates of completion or some form of recognition to participants who actively
engage and complete the seminar successfully. This can incentivize participation and
provide attendees with a tangible acknowledgment of their knowledge and skills in
cybersecurity and data privacy.

Expected Output:
1. The audience will gain a heightened understanding of the critical importance of
cybersecurity and data privacy in today's digital age.
2. Participants will become familiar with key terminologies and the scope of the seminar,
setting the stage for further discussions.
3. Attendees will receive insights into the evolving landscape of cybersecurity threats,
including emerging risks like ransomware and social engineering.
4. Real-world examples of recent cyberattacks and data breaches will be provided to
highlight their impact on organizations and individuals.
5. The seminar will explore the underlying reasons that render systems vulnerable to cyber
threats, encompassing factors like human mistakes, insufficient security measures, and
system weaknesses.
6. Participants will gain an understanding of how government regulations and industry
standards influence data privacy and cybersecurity practices, emphasizing the
consequences of non-compliance.
7. Practical steps and best practices for protecting against various cyber threats, such as
implementing strong password policies, keeping software up to date, and providing
employee training, will be discussed.
8. Guidance on protecting personal and sensitive data, whether in digital or physical form,
will be provided to reduce the chances of privacy breaches.

Resource Speakers:
Jean Claude Manalo
James Ducusin
Randell Reyonda
Angelica Mendoza
Edily Manzo

You might also like